Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

Linking attacks to threat actors: case studies

In this talk, Kurt Baumgartner will examine recent APT alerts and discussions, and how to get the jump on how or why this malware is connected with past activity. In particular, we will start with 2020 Kwampirs and Lazarus reporting and present details on these malware techniques. See the talk - https://www.brighttalk.com/webcast/15591/414427/great-ideas-powered-by-sas-malware-attribution-and-next-gen-iot-honeypots?utm_source=twitter&utm_medium=social&utm_campaign=gl_Espo_je0066&utm_content=link&utm_term=gl_twitter_organic_vhodkkt66zpvmhb

  • Sé el primero en comentar

Linking attacks to threat actors: case studies

  1. 1. • • • •
  2. 2. Darkhotel - part 2 MsnMM Campaigns Satellite Turla Wild Neutron Blue Termite Spring Dragon 2011 2010 2013 Stuxnet Duqu 2012 Gauss Flame Mini Flame NetTraveler Miniduke RedOctober Icefog Winnti Kimsuky TeamSpy 2014 Epic Turla CosmicDuke Regin Careto / The Mask Energetic Bear / Crouching Yeti Darkhotel 2015 Desert Falcons Hellsing Sofacy Carbanak Equation Naikon Animal Farm Duqu 2.0 ProjectSauron Saguaro StrongPity Ghoul Fruity Armor ScarCruft 2016 Poseidon Lazarus Lurk GCMan Danti Adwind Dropping Elephant Metel Shamoon 2.0 WannaCry Moonlight Maze WhiteBear Silence 2017 ShadowPad BlueNoroff ExPetr/NotPetya ATMitch BlackOasis StoneDrill
  3. 3. • • • • •
  4. 4. • • • • •
  5. 5. • • •
  6. 6. • • •
  7. 7. • • • • •
  8. 8. • • • • • •

×